In which of the following types of attack does an attacker exploit the carrier-sense multiple access with collision avoidance (CSMA/CA) clear channel assessment (CCA) mechanism to make a channel appear busy?

A. Beacon flood
B. Denial of service
C. Access point theft
D. EAP failure

Answer: B. Denial of service

Computer Science & Information Technology

You might also like to view...

The Document Inspector identifies personal information or hidden data with a(n):

A) animated icon. B) red flag. C) exclamation point. D) check mark.

Computer Science & Information Technology

The good member function will return false if:

a. The eof member function would return true. b. The bad member function would return true. c. The failbit member function would return true. d. Any of the above.

Computer Science & Information Technology